Information Operations and Legal Framework Changes: A Brief Analysis
Executive Summary
While the Smith-Mundt Modernization Act of 2012 does not directly authorize DOD or Intelligence Community domestic information operations, it has created an enabling legal and operational environment that facilitates information warfare activities targeting domestic audiences through journalistic channels and social media platforms.
Legal Framework Changes
Smith-Mundt Modernization Act (2012)
The modernization act removed the domestic dissemination ban that previously prohibited government-produced foreign-targeted content from reaching American audiences. Key changes include:
- Elimination of Legal Barriers: Removed the prohibition on domestic dissemination of materials "intended primarily for foreign audiences"
- Social Media Integration: Explicitly authorized dissemination through "the Internet, and other information media, including social media"
- Incidental Exposure Protection: Added language stating nothing shall prohibit agencies "from engaging in any medium or form of communication...because a United States domestic audience is or may be thereby exposed to program material"
Deep Dive: Social Media Authorization Language
Exact Statutory Text:
The modernization act specifically authorizes agencies to disseminate information "through press, publications, radio, motion pictures, the Internet, and other information media, including social media, and through information centers and instructors."
Critical Legal Implications:
- "Including Social Media" - Explicit Authorization
- Pre-2012: Social media platforms were legally ambiguous under original Smith-Mundt
- Post-2012: Social media explicitly listed as authorized dissemination channel
- This language was forward-looking - recognizing social media's growing dominance
- "Other Information Media" - Catch-All Provision
- Provides flexibility for future platforms and technologies
- Covers emerging platforms (TikTok, Discord, etc.) not specifically named
- Allows adaptation to new communication methods without legislative updates
- No Geographic or Audience Restrictions
- Original Smith-Mundt required content be "intended primarily for foreign audiences"
- Modernization act removes practical ability to restrict audience reach
- Social media's borderless nature makes geographic targeting impossible
Operational Translation:
Before 2012:
- Government agencies had to actively prevent Americans from accessing their foreign-targeted content
- Social media posts by government entities could face legal challenges
- Content had to be geofenced or technically restricted from domestic access
After 2012:
- Government can post content on any social platform without domestic access restrictions
- No requirement to prevent American users from seeing, sharing, or engaging with content
- Legal protection for "incidental" domestic exposure through social sharing
Practical Examples:
- Voice of America Social Media
- Can now operate unrestricted Facebook, Twitter, Instagram accounts
- American users can follow, share, and engage without legal barriers
- Content appears in American users' feeds through algorithmic distribution
- State Department Digital Diplomacy
- Can engage in social media campaigns that reach domestic audiences
- Twitter threads, Facebook posts, YouTube videos legally accessible to Americans
- Viral content spreads naturally to domestic users
- Broadcasting Board of Governors Platforms
- Radio Free Europe, Radio Free Asia content can be shared on social platforms
- Americans can subscribe to channels previously restricted
- Content recommendations algorithms expose Americans to government-produced material
Executive Order 12333 Considerations
EO-12333 governs intelligence activities and contains restrictions on domestic operations. However, the modernization act may have reduced EO-12333 concerns by:
- Removing Conflicting Authorities: Eliminating Smith-Mundt restrictions that might have created legal conflicts with intelligence operations
- Legitimizing Spillover Effects: Providing legal cover for intelligence operations that inevitably reach domestic audiences through digital platforms
- Creating Parallel Channels: Establishing legitimate pathways for government information that can obscure intelligence-driven content
How Social Media Integration Circumvents EO-12333 Restrictions
Traditional EO-12333 Domestic Limitations:
- Prohibits CIA electronic surveillance within the United States except for training/testing
- Restricts domestic intelligence collection to the FBI for foreign intelligence purposes
- Requires Attorney General approval for domestic intelligence techniques
- Generally prohibits intelligence agencies from targeting U.S. persons domestically
Social Media Integration as EO-12333 Workaround:
- "Foreign Targeting" Legal Fiction
- Intelligence operations can claim to target foreign audiences via social media
- Algorithms automatically distribute content to domestic users
- No active "targeting" of Americans - just "incidental exposure"
- EO-12333 restrictions on domestic operations technically avoided
- Platform-Mediated Collection
- Intelligence agencies don't directly collect domestic data
- Social media platforms collect user engagement data with government content
- Government can request analytics and user interaction data from platforms
- Data sharing occurs through commercial relationships, not direct surveillance
- Open Source Intelligence (OSINT) Loophole
- Content posted publicly on social media becomes "open source"
- EO-12333 allows collection of publicly available information
- Government can monitor domestic reactions to its own social media content
- User engagement data reveals domestic audience preferences and vulnerabilities
- Contractor Operations Buffer
- Private contractors operate social media accounts on government behalf
- Creates legal separation between intelligence agencies and domestic operations
- Contractors can engage in activities that might violate EO-12333 for direct government employees
- Intelligence agencies maintain plausible deniability about domestic targeting
Specific EO-12333 Circumvention Mechanisms:
Intelligence Collection Through Social Engagement:
- Government posts content designed to elicit specific domestic responses
- Engagement patterns reveal domestic political sentiments and vulnerabilities
- Comment analysis provides insight into domestic opposition movements
- Viral mechanics map domestic information distribution networks
Behavioral Influence Operations:
- Intelligence agencies can influence domestic behavior through "foreign-targeted" content
- Psychological operations conducted via social media platforms
- Domestic audience manipulation disguised as foreign information operations
- Real-time adjustment of messaging based on domestic engagement data
Network Mapping and Analysis:
- Social media interactions reveal domestic social and political networks
- Government content sharing patterns expose influence relationships
- Platform analytics provide detailed demographic and psychographic data
- Intelligence agencies gain domestic surveillance capabilities without direct collection
Legal Cover Through Commercial Partnerships:
- Intelligence agencies partner with social media platforms for "foreign interference" detection
- Partnerships provide access to domestic user data under national security justifications
- Platform cooperation legitimizes intelligence access to domestic social media data
- Commercial relationships circumvent traditional EO-12333 oversight mechanisms
Organizational Origins of Information Operations
Multiple Command Structures
Information operations communications plans would likely originate from several different offices, creating a complex web of authorities and plausible deniability:
1. Pentagon Public Affairs (OATSD(PA))
- The assistant to the secretary of defense for public affairs leads a worldwide public affairs community of some 3,800 military and civilian personnel
- The Office of the Assistant to the Secretary of Defense for Public Affairs (OATSD(PA)) advises the Secretary and Deputy Secretary of Defense on issues related to public information, internal information, community relations, social media, trademarks and the DOD Brand Guide
- Handles "white" operations - officially acknowledged government information
2. Military Information Support Operations (MISO/PSYOP Units)
- PSYOP are operations to convey selected information and indicators to audiences to influence their motives and objective reasoning, and ultimately the behavior of governments, organizations, groups, and large foreign powers
- PSYOP refers to "the ability to operate in an approved area to influence the behaviors and attitudes of foreign target audiences, in line with national objectives"
- The national and regional WebOps centers maintain overt pro-U.S. websites and social media accounts that publish propaganda, but where the connection to the Pentagon is obscured or hidden in the fine print
3. Special Operations Command Information Operations
- Colin Kahl, the undersecretary of defense for policy, last week instructed the military commands that engage in psychological operations online to provide a full accounting of their activities
- Congress in late 2019 passed a law affirming that the military could conduct operations in the "information environment" to defend the United States and to push back against foreign disinformation aimed at undermining its interests. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations
4. Combatant Command Information Operations Cells
- Citing unnamed government sources, the Washington Post tied at least some of the activity to the Pentagon, and said that officials of the US Central Command, which oversees operations in the Middle East, were "facing scrutiny"
- Regional commands have their own information operations capabilities
Operational Separation and Legal Cover
Public Affairs vs. Information Operations:
"These are not public affairs operations," Ryder told reporters, adding that "It's an aspect of warfare as old as warfare itself, and we conduct those operations in support of national security priorities"
This separation provides legal and operational benefits:
- Public Affairs operates under transparency principles
- Information Operations operate under military necessity and foreign targeting justifications
- Different legal authorities and oversight mechanisms
- Plausible deniability when operations are exposed
The Joel Schectman Case Study - Likely Origins
Most Probable Source Structure:
- AARO/Intelligence Community: Sean Kirkpatrick provides "exclusive" information
- Pentagon Public Affairs: Coordinates media engagement and access
- Information Operations Cell: Shapes narrative strategy and talking points
- Contractor Networks: Amplify messaging through social media and third-party platforms
Coordination Mechanisms:
- Weekly information operations planning meetings
- Shared talking points across agencies
- Coordinated timing of releases
- Cross-platform amplification strategies
Current Revelations About Operations
Pentagon Acknowledgment of Covert Social Media:
Facebook and Twitter have removed fake accounts suspected of being run by the Defense Department, and The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory
Operational Scope:
According to the report, MISO and other types of information operations are the main way the military responds to adversaries without engaging in armed combat, and MISO [the operations themselves] to counter strategic competitors have more than tripled in the past three years — comprising more than 60% of SOF's [special operations forces] worldwide MISO activities in FY 2023
Legal Gray Areas:
Pentagon policy and doctrine discourage the military from peddling falsehoods, but there are no specific rules mandating the use of truthful information for psychological operations. For instance, the military sometimes employs fiction and satire for persuasion purposes
Media Manipulation Through Official Sources
The Joel Schectman Wall Street Journal case demonstrates how information operations can exploit journalistic practices:
1. Exclusive Access Trading
- Government sources provide "exclusive" information to journalists
- Access is conditioned on favorable coverage or specific framing
- Journalists become unwitting conduits for officially sanctioned narratives
2. Source Protection Exploitation
- Officials can provide information while maintaining plausible deniability
- Journalists protect sources, preventing verification of motivations
- False or misleading information gains credibility through prestigious outlets
3. Narrative Seeding
- Strategic placement of stories to shape public perception
- Use of "former officials" who maintain unofficial government connections
- Coordination across multiple media outlets to amplify messaging
Social Media Operations
The removal of domestic dissemination barriers enables:
1. Direct Platform Engagement
- Government agencies can directly operate social media accounts targeting domestic audiences
- Content can be labeled as "foreign-targeted" while reaching Americans
- Algorithmic amplification spreads government messaging organically
2. Proxy Account Networks
- Use of contractor-operated accounts to amplify official messaging
- Creation of artificial grassroots support ("astroturfing")
- Coordination between official and unofficial accounts
3. Information Laundering
- Government-produced content gets shared through intermediary accounts
- Original source becomes obscured through multiple sharing layers
- Content appears to originate from independent sources
The Social Media Exploitation Framework
Legal Foundation Created by Modernization Act:
The explicit inclusion of "social media" in the statutory language creates several operational opportunities:
- Algorithmic Distribution Exploitation
- Government content enters social media algorithms designed to maximize engagement
- Viral mechanics naturally amplify government messaging to domestic users
- Platform recommendation systems become unwitting distribution channels
- Emotional or controversial government content gets preferential algorithmic treatment
- Cross-Platform Content Laundering
- Content originates on "foreign-targeted" platforms (Voice of America website)
- Gets shared to mainstream social platforms (Twitter, Facebook, TikTok)
- Original government source becomes obscured through sharing chains
- Content appears organic when shared by third parties
- Influencer and Media Integration
- Government-produced content can be shared by journalists and influencers
- Social media personalities amplify official messaging with personal credibility
- Content reaches audiences who distrust traditional government sources
- Parasocial relationships between influencers and audiences enhance message reception
Operational Techniques Enabled:
- Native Content Creation
- Government agencies create content that mimics platform-native formats
- TikTok videos, Instagram stories, Twitter threads designed for viral spread
- Content styled to appear organic rather than official government communications
- Platform-specific optimization for maximum reach and engagement
- Coordinated Inauthentic Behavior (Legal Version)
- Multiple government accounts can coordinate messaging campaigns
- Timing of posts across platforms to create artificial trending topics
- Use of hashtags and mentions to amplify reach
- Engagement tactics (likes, shares, comments) to boost algorithmic promotion
- Crisis Communication Weaponization
- During information crises, government can flood social platforms
- Competing narratives get buried by volume of official content
- Emergency authorities may bypass normal oversight for social media operations
- Real-time narrative shaping during developing news events
Case Study Applications:
UFO/UAP Disinformation Campaign Example:
- AARO-affiliated accounts share "debunking" content
- Former officials with social media presence amplify messaging
- Content gets picked up by science and skeptic communities
- Algorithmic distribution targets users interested in UFO topics
- Government narrative spreads organically through engaged user sharing
Election Security Messaging:
- DHS cybersecurity content shared across platforms
- "Foreign interference" narratives amplified through official channels
- Content designed to influence domestic election perceptions
- Viral mechanics spread government election security assessments
Military/Defense Promotion:
- DOD contractors and personnel share recruitment and promotion content
- Military technology demonstrations go viral on platforms
- Government-favorable content about defense spending and capabilities
- Patriotic imagery and messaging designed for emotional engagement
Case Study: UAP Disinformation Campaign
The recent Wall Street Journal article exemplifies these mechanisms:
Official Source Exploitation:
- Sean Kirkpatrick (former AARO director) provided "exclusive" information
- Article advanced government narrative while appearing investigative
- Contradicting witnesses were excluded or minimized
Information Operation Indicators:
- Factual errors favoring government position
- One-sided sourcing despite journalist's claimed extensive research
- Timing coincided with Congressional UFO hearings
Legal Protection:
- Government sources operated under official capacity
- Information technically fell under "transparency" rather than propaganda
- Smith-Mundt modernization provided legal cover for domestic dissemination
Implications
Erosion of Information Integrity
- Traditional journalism safeguards undermined by official source manipulation
- Public difficulty distinguishing between legitimate reporting and information operations
- Degradation of trust in both media and government institutions
Constitutional Concerns
- Government influence on domestic information environment
- Potential violation of First Amendment principles
- Circumvention of traditional oversight mechanisms
National Security Paradox
- Information operations targeting Americans may serve foreign adversary interests
- Domestic disinformation campaigns undermine democratic processes
- Short-term tactical gains versus long-term institutional damage
Recommendations
- Congressional Oversight: Formal investigation into DOD/IC domestic information activities
- Journalistic Standards: Enhanced verification requirements for government sources
- Legal Clarification: Explicit restrictions on domestic-targeted information operations
- Transparency Requirements: Disclosure mandates for government social media activities
- Public Education: Awareness campaigns about information operation tactics
Conclusion
The Smith-Mundt Modernization Act, while not directly authorizing DOD/IC domestic operations, has created legal and operational space for sophisticated information warfare targeting American audiences. The combination of removed legal barriers, digital platform exploitation, and journalistic source relationships enables government agencies to influence domestic information environments while maintaining plausible deniability.
This represents a fundamental shift in the information landscape, requiring new oversight mechanisms and public awareness to preserve democratic discourse and institutional integrity.